Wireless Security

SECURITY OF WIRELESS COMMUNICATIONS
Introduction
Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.

Purpose of the Study
The purpose of the study was to assist in the decision whether Lotus Development should extend current security policies to encompass wireless devices.  The following are critical security questions:
·    What challenges are faced with wireless security?
·    How can you verify that the device being used is actually in the hands of an authorized user? How can you enhance the security of the device?
·    How secure is the over-the-air network between the organization and the wireless device?
·    How can you secure the wireless session?
·    Should Lotus development include wireless devices in their security policies?
Research Methods and Procedures
Through traditional and electronic research of books, periodicals, and business journals, secondary research was conducted.  Figures were constructed through extensive research and study of interactions of networks.

                             
            &nbs ...
Word (s) : 3342
Pages (s) : 14
View (s) : 554
Rank : 0
   
Report this paper
Please login to view the full paper